OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Ring-ExpLWE: A High-Performance and Lightweight Post-Quantum Encryption Scheme for Resource-Constrained IoT Devices
Dongdong Xu, Xiang Wang, Yuanchao Hao, et al.
IEEE Internet of Things Journal (2022) Vol. 9, Iss. 23, pp. 24122-24134
Closed Access | Times Cited: 10

Showing 10 citing articles:

Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
Shraiyash Pandey, Bharat Bhushan
Wireless Networks (2024) Vol. 30, Iss. 4, pp. 2987-3026
Closed Access | Times Cited: 5

Quantum Secure Threshold Private Set Intersection Protocol for IoT-Enabled Privacy-Preserving Ride-Sharing Application
Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 1, pp. 1761-1772
Closed Access | Times Cited: 9

A Hardware Security Protection Method for Conditional Branches of Embedded Systems
Qiang Hao, Dongdong Xu, Yusen Qin, et al.
(2024)
Open Access | Times Cited: 1

A Hardware Security Protection Method for Conditional Branches of Embedded Systems
Qiang Hao, Dongdong Xu, Yusen Qin, et al.
Micromachines (2024) Vol. 15, Iss. 6, pp. 760-760
Open Access | Times Cited: 1

Challenges and Solutions in Integrating Narrowband IoT with Edge Computing: Resource Constraints, Security, Latency, and IDS Deployment
Waldon Hendricks, Boniface Kabaso
Lecture notes in networks and systems (2024), pp. 119-134
Closed Access

A Compact Implementation of Shadow on an IoT Processor
Wen Chen, Wenfen Liu, Ying Guo, et al.
International Journal of Circuit Theory and Applications (2024)
Closed Access

Post-Quantum Lightweight Encryption Algorithm for Internet of Things Devices
Abhishek Dwivedi, Ratish Agarwal, Piyush Kumar Shukla
(2023), pp. 1-8
Closed Access | Times Cited: 1

Low-Latency PAE: Permutation-Based Address Encryption Hardware Engine for IoT Real-Time Memory Protection
Xuewen He, Yichuan Bai, Yujia Liu, et al.
IEEE Internet of Things Journal (2023) Vol. 11, Iss. 7, pp. 12319-12330
Closed Access

Lightweight Ring Learning With Errors Cryptographic Scheme for Secure Cloud-IoT Systems
N Mangala, B. Eswara Reddy, K R Venugopal
2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) (2023)
Closed Access

Page 1

Scroll to top